default search action
17. ESORICS 2012: Pisa, Italy - DPM/SETOP
- Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State:
Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers. Lecture Notes in Computer Science 7731, Springer 2013, ISBN 978-3-642-35889-0
Data Privacy Management
- Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos:
Fair Anonymous Authentication for Location Based Services. 1-14 - Tuan Ta, John S. Baras:
Enhancing Privacy in LTE Paging System Using Physical Layer Identification. 15-28 - Xihui Chen, David Fonkwe, Jun Pang:
Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems. 29-42 - Mohammed Meziani, Rachid El Bansarkhani:
An Efficient and Secure Coding-Based Authenticated Encryption Scheme. 43-60 - Ronny Merkel, Matthias Pocs, Jana Dittmann, Claus Vielhauer:
Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany. 61-74 - Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:
Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada. 75-88 - Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti:
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. 89-103 - Sébastien Gambs, Julien Lolive:
SlopPy: Slope One with Privacy. 104-117 - Florian Kammüller:
A Semi-lattice Model for Multi-lateral Security. 118-132 - Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Prioritized Execution of Privacy Policies. 133-145 - Elisa Costante, Jerry den Hartog, Milan Petkovic:
What Websites Know About You. 146-159 - Peng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira:
Automating Privacy Enforcement in Cloud Platforms. 160-173 - Kuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif:
Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach. 174-186
Autonomous and Spontaneous Security
- Nizar Kheir:
Analyzing HTTP User Agent Anomalies for Malware Detection. 187-200 - Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. 201-216 - Matteo Maria Casalino, Henrik Plate, Serena Elisa Ponta:
Configuration Assessment as a Service. 217-226 - William M. Fitzgerald, Ultan Neville, Simon N. Foley:
Automated Smartphone Security Configuration. 227-242 - Denise Dudek:
On the Detectability of Weak DoS Attacks in Wireless Sensor Networks. 243-257 - Amrita Ghosal, Sanjib Sur, DasBit Sipra:
μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks. 258-273 - David Goergen, Thibault Cholez, Jérôme François, Thomas Engel:
Security Monitoring for Content-Centric Networking. 274-286 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stephane Morucci:
Towards Session-Aware RBAC Delegation: Function Switch. 287-302 - Wihem Arsac, Annett Laube, Henrik Plate:
Policy Chain for Securing Service Oriented Architectures. 303-317 - Wael Kanoun, Layal Samarji, Nora Cuppens-Boulahia, Samuel Dubus, Frédéric Cuppens:
Towards a Temporal Response Taxonomy. 318-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.